<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Icinga — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/icinga/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 24 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/icinga/feed.xml" rel="self" type="application/rss+xml"/><item><title>Icinga Web Reflected XSS Vulnerability via Malformed Search Requests</title><link>https://feed.craftedsignal.io/briefs/2024-01-icinga-web-xss/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-icinga-web-xss/</guid><description>A reflected cross-site scripting (XSS) vulnerability exists in Icinga Web versions 0.13.0 and earlier, allowing attackers to inject malicious JavaScript into a victim's browser through malformed search requests, potentially leading to arbitrary code execution within the Icinga Web context.</description><content:encoded><![CDATA[<p>A reflected XSS vulnerability has been identified in Icinga Web, affecting versions up to 0.13.0. This vulnerability arises from the improper handling of malformed search requests, allowing an attacker to inject arbitrary JavaScript code into a victim&rsquo;s browser. The attacker crafts a malicious URL containing the XSS payload and entices the victim to visit this URL. Upon visiting the crafted URL, the injected JavaScript code executes within the context of the Icinga Web application, potentially enabling the attacker to perform actions on behalf of the victim, steal sensitive information, or compromise the integrity of the application. The vulnerability was patched in version 0.13.1 and will be published as part of <code>icinga-php-library</code> version 0.19.2. Icinga Web versions 2.12.0 and later can mitigate the issue by enabling Content-Security-Policy (CSP).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious URL containing a reflected XSS payload within a malformed search request. The payload is designed to execute arbitrary JavaScript code in the victim&rsquo;s browser.</li>
<li>The attacker distributes the crafted URL to potential victims through various means, such as phishing emails, social engineering, or malicious websites.</li>
<li>The victim clicks on the malicious URL, unknowingly initiating the XSS attack.</li>
<li>The victim&rsquo;s browser sends the crafted HTTP request to the Icinga Web server.</li>
<li>The Icinga Web server processes the request and reflects the malicious XSS payload back to the victim&rsquo;s browser in the HTTP response.</li>
<li>The victim&rsquo;s browser renders the HTTP response, executing the injected JavaScript code within the context of the Icinga Web application.</li>
<li>The attacker can now execute arbitrary code, potentially stealing session cookies, performing actions on behalf of the user, or defacing the Icinga Web interface.</li>
<li>The attacker leverages the compromised Icinga Web session to gain unauthorized access to sensitive data or perform malicious activities within the Icinga environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary JavaScript code in the context of the Icinga Web application. This can lead to session hijacking, unauthorized access to sensitive data, defacement of the Icinga Web interface, or further compromise of the Icinga infrastructure. While the exact number of victims is unknown, any organization using vulnerable versions of Icinga Web is at risk. The severity is high due to the potential for significant impact on confidentiality, integrity, and availability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Icinga Web to version 0.13.1 or later to patch the vulnerability. This version contains the fix for CVE-2026-42224.</li>
<li>For Icinga Web versions 2.12.0 and later, enable Content-Security-Policy (CSP) in the general configuration to mitigate the risk of XSS attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Icinga Web XSS Attempt via URI&rdquo; to your SIEM to detect potential exploitation attempts by monitoring for suspicious URI patterns.</li>
<li>Review web server logs for unusual or malformed requests targeting the Icinga Web application to identify potential XSS attack attempts (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>xss</category><category>web-application</category><category>icinga</category></item></channel></rss>